This course will teach viewers about the basic elements of AWS. We will start with IAM and Security. Core services like storage, databases, compute, DNS and networking will be covered in short, introductory lessons. I will include demos of key services.

As an administrator myself I am well aware of the challenges that you will face trying to decide where and how to start coding. We are more than aware of the need to code:

Accelerating repetitive tasks

Ensuring accuracy of the task and it being repeatedly correct

Delegating administrative tasks

Sharing of tools

Running commands across many systems simultaneously

Linux is a great platform on which to begin writing code, therefore the need for developers and administrators in Linux is high. Linux distributions generally come with all the tools needed to start writing code. This is true regardless of whether you look at Shell scripting, Python, PERL, Java or C, your distribution will include the tools that you need at no additional cost.

However, if you don’t code already where do you start? There are so many languages that you can use in Linux, but which should you choose?

What will still be relevant in a year’s time?

Do I need additional packages installed to run a program or script?

Is this program or script portable?

Is it easy to learn?

What is the speed of writing?

What kind of support is offered?

With these questions all acting as hurdles, it is here that many administrators stop. I’m here to help you make the correct choice based on what I have already learned and experienced in over 20 years of Linux and Unix administration.

BASH Scripts

One of the quickest mechanisms to get you started with automation is a BASK shell script. You will already be familiar with running commands at the command line, making this the most natural next step for administrators. BASH is available on almost every Unix and Linux system and includes OS X.

To print the ubiquitous “hello world” in a shell script we would just need two lines in a text file:

Python

Python is another scripting language that extends past shell scripting. With BASH scripting, you are limited to running shell commands, repeating what you do at the command prompt. With Python, you are able to bypass commands having direct access to many APIs (Application Programming Interface). This gives you the power to create your own bespoke applications using only the resources that you need.

Python has the added benefit of being described as “elegant code,” meaning the unnecessary clutter of braces and semi-colons is removed, and as with all great works of art, the white-space is significant. Whereas in most languages, indenting of code-blocks is optional, in Python it is required.

The simple hello world statement written in Python would be:

#!/usr/bin/pythonprint(“Hello World”)

Both Python and BASH are scripting languages that begin in a similar way. We highlight the path to the interpreter that must execute the script. This introduces an inherent performance issue. Compiled code, on the other hand, does not need an interpreter and is already optimized for the hardware it was intended to run. We look at C programming next as an example of compiled code.

C Programming

C Programming goes back to the 1970’s. With this in mind, you may feel that it is not something you should be learning now, however, I disagree. For starters, most Linux and Unix programs are written in C. The Linux kernel is entirely written in C. This shows the longevity of the language, and in a time where development languages come and go at a frightening pace, it is reassuring to know that this language remains.

Although it is not the easiest of languages to learn, the concept of strings does not exist in C, learning C will help you learn almost any language. Think of the concept of learning programming properly in the first instance rather than learning shortcuts to programming.

To say hello in C it takes a little more typing, but not that much more than we have seen previously:

#include<stdio.h>int main (void) { puts("Hello World");}

We create C programs as text files and then compile the code into an executable. This should improve the efficiency of the program as it is not reliant on the BASH shell or programs that the script calls. Everything in C is written direct to the APIs exposing resources on your system.

To compile a C program in Linux we would use:

$ gcc -Wall -o hello hello.c

The command will create a program called hello by reading in the source file of hello.c.

Being a more mature language, C has a huge support base, including books, courses and web pages to help you learn. Learning C will also assist you in learning any other language, which is one of the reasons I am still very keen on promoting C.

In summary, there are many ways that you can start to program in Linux. The biggest task is “to start.” Once you have begun your programming journey, you will have been bitten by the bug and will not want to stop. Start with what you can achieve easily and quickly. This is often in the familiarity of BASH scripts. Once you have conquered that, start moving forward with Python scripts and show yourself how much more you can achieve. Finally, prove yourself as a developer by creating your own programs in C.

About The Author

Andrew is an avid Linux author and advocate, with 5 book titles to his name and over 900 videos on his youtube channel. Having started training and consulting in Linux during the late 1990's, he is well versed in many Linux distributions and services.

This course is intended for network and voice professionals looking to further improve their knowledge, or prepare themselves for the CIPTV2 exam. In this course, we will be looking at VCS Control, VCS Expressway or Collaboration Edge, QoS with CUCM, Centralized Call Processing Redundancy with SRST and MGCP Fallback, CCD + SAF, ILS + GDPR, Video Mobility and Bandwidth Management. This course will be delivered in lecture based format with plenty of hands on practical demonstrations.

This course will cover what the terms Continuous Integration and Continuous Delivery mean within the software development practice and the configuration and usage of both a Continuous Integration pipeline and Continuous Delivery pipeline using Microsoft Visual Studio in conjunction with Microsoft VSTS and Azure Cloud.

This Routing Protocol Security course was created by Piotr Kaluzny and is 1 hour and 45 minutes long. It consists of multiple videos in which the instructor discusses all relevant theoretical concepts and technologies, (in-depth explanations, whiteboarding) and demonstrates how to implement them on the current CCIE Security v5 lab exam hardware.

Why You Should Watch

Security is no longer just an “important” component of an organization. A constantly increasing number of aggressive cyber criminals launch their attacks not only from the outside, but also inside organizations, making security an inherent component of any modern network/system design.

This course, like all other courses that are part of the “CCIE Security v5 Technologies” series, is meant to teach you Cisco security technologies and solutions using the latest industry best-practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.

Who Should Watch

This course is intended for students preparing for their CCNA/CCNP/CCIE security exams. It is also great for experienced Network (Security) Engineers, or Administrators, looking to refresh their knowledge of important network security concepts before moving forward with other certifications.

What You’ll Learn

This course will help you understand the different methods used to secure routing protocols in a network infrastructure. The course focuses on EIGRP, OSPF & BGP for IPv4 and IPv6 and includes a discussion on the newest routing security features recently added to the IOS code.

About The Instructor

Piotr Kaluzny has been in the IT field since 2002 when he was exposed to networking and programming during his studies. His career in production networks began in 2007, right after graduating with MSc in Computer Science. Piotr quickly progressed his career by working for multiple enterprise and non-enterprise companies in different routing & switching and security roles, with his responsibilities ranging from operations and engineering, to consulting and management.

Since the beginning, Piotr has been heavily focused on the Security track to finally prove his skills in 2009 by passing the CCIE security certification exam (#25565) on the first attempt (he also holds R&S and Security CCNP and CCNA certifications).

Piotr already has an extensive background as a Senior Technical Instructor. For the past several years he has been solely responsible for designing, developing and conducting CCNA, CCNP and CCIE training courses for one of the largest and most respected Cisco training companies in the world.

This video series is jam packed with real world BIG-IP DNS designs, issues, and latest BIG-IP DNS features. We will go over the BIG-IP DNS F5 blueprint in detail and follow all examples listed within it. This video series will be in four sections covering: Design and Architect, Implement, Test and Troubleshoot, and Operations and Support. We will cover this exam blueprint from A to Z as we talk in depth about all BIG-IP DNS features and designs, including DNS Express, Zone Runner, DNS64, DNSSEC, DNS Cache, DNS LB Methods, DNS Persistence, iQuery, F5 iApp Analytics, SNMP Polling, and more. This is content you won’t find anywhere else!

This BIP-IP DNS Specialist course we will cover the Design, Architecture, Implementation, and Troubleshooting of BIG-IP DNS and will provide you with the advanced troubleshooting tools and industry knowledge needed to be a BIG-IP DNS expert.

Why You Should Watch

This course is designed to provide you with everything needed to pass the F5 DNS Exam - Whether that is explanations of various designs of F5 DNS, hands-on demos, or any other additional resources, this course has it all, making it the best place to start your training journey.

Not only will this course help you earn your F5 DNS certification, boost your resume, and increase your earning potential, it will also help you take things to a higher level and provide real 'value' to any business you work for, or with. As customers are moving from on-premise solutions to hybrid cloud solutions, F5 DNS is vital to assuring availability needs for your application. Applications start with DNS, and DNS will always play a vital role in a network, regardless of which and what infrastructure is supporting the application, making knowledge of F5 DNS highly valuable. The goal throughout this course is to give you just that, value that you can bring to any organization you work with.

Who Should Watch

This course is specifically designed for Network Admins, Pre and Post-Sales Network Consultants, CIO, Network Solution Architects and Application Architects, but is also a great resource for anyone interested in learning about F5 DNS.

What You'll Learn

The following topics will be covered:

Location Based Routing

DDoS Protection

Monitoring and Automated Failover

DNS Firewall Services

Global Server Load Balancing

Superior DNS Performance

Advanced SNMP Polling/Traps

Analytics F5 iApp/Splunk

DNSSEC

F5 DNS Express

F5 DNS Zonerunner

F5 DNS Caching Solutions

F5 Load Balancing Methods

F5 DNS Persistence

F5 DNS64

F5 iQuery

About The Instructor

My name is TJ Vreugdenhil. I am a Network Consultant that helps customers design, scale, implement, and secure their network in a way that makes the most sense to their business. I am a F5 Certified Solution Expert in Security, which is currently the highest offered certification by F5. I obtained my CCIE R/S in 2015. I greatly enjoy solving complex problems, (who doesn’t?) you know the ones I am talking about! My focus has been in Network Security starting with CheckPoint Firewalls in R65. F5 BIG-IP is a product I spend quite a bit of time with, but as you know, in this industry you must keep learning and growing. My next focus areas are Palo Alto Networks, Ansible automation, F5 Cloud and Automation, and Cisco Firepower. I love what I do, and I am blessed with the many opportunities I have to work with many different clients and networks. I grew up in Northwest Iowa and later moved to the Kansas City area where I lived for 9 years. I decided to get back to my roots and am now living in Northwest Iowa again with my wife and our two boys. Outside of work, I enjoy racquetball, guitar, BBQ, and living with purpose.

*The Postings on this site are my own and don't necessarily represent Sirius's positions, strategies, or opinions

About The Course:

Security in the cloud is much like security in your on-premise data centers - only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment, and in this course we will cover them.